Welcome!

News Feed Item

New Law Protects Pennsylvanians Recovering Lost Money and Items

Unclaimed Property "Finders" Will Be Subject to State Approval and Oversight

HARRISBURG, PA--(Marketwired - August 04, 2014) - At the urging of state Treasurer Rob McCord, legislation enacted this month will guard Pennsylvanians against fraud and deceptive practices when they employ a service to help them claim their money or property that has been turned over to the state.

With changes made through the Fiscal Code bill (Act 126 of 2014), new sections were added to the state's unclaimed property law allowing the Treasury to oversee those who for a fee assist others in locating and recovering unclaimed property -- commonly known as "finders." People engaging in that business will be required to apply for approval, register, and remain subject to Treasury oversight. McCord stressed that Pennsylvanians, businesses and other organization can always claim their property for free directly from the state Treasury Department.

"The vast majority of finders operate within the law, and they can provide a valuable service to some people who may either not know they have unclaimed property, or need help to retrieve it," McCord said. "Unfortunately, however, a relative few take advantage of those who are not fully aware of their rights."

Under long-standing Pennsylvania law, finders are permitted to charge up to 15 percent of the amount they help to claim. Treasury has regularly seen instances, however, of some finders charging a higher percentage, illegally adding additional fees on top of the allowable percentage, or fraudulently claiming the money or property themselves and passing only a small portion on to the rightful owner.

"We've seen some heartbreaking examples of people who desperately could have used the money they had coming to them, but instead sacrificed an excessively large share of it to an unscrupulous finder," McCord said.

McCord reiterated that for no charge, anyone can contact the state Treasury to check if they have unclaimed property, and initiate a claim. They can do so by visiting www.patreasury.gov or by calling toll free at 1-800-222-2046 Monday through Friday, 7:30 a.m. to 4:30 p.m. where a member of Treasury's Return Team will assist them.

Actions of some finders operating outside the law have required Treasury investigators and legal staff to invest considerable time and resources aiding and protecting citizens who have been defrauded, including making court appearances on some occasions. Often, Treasury staff has been forced to pursue cases that involve repeat offenders. McCord approached the legislature this year with suggested remedies that would permit Treasury to crack down on illegal operators while not heavily burdening those who abide by the law.

Under the new provisions, no person may act as a finder without first applying for and receiving a certificate of registration with the state Treasury. When submitting an application, finders will have to attest under penalty of perjury that they have not been convicted of a felony or certain other criminal offenses within 10 years and that they are not under investigation for such crimes, and agree to a background check to verify the information. Treasury will issue a registration certificate and number valid for two years, after which registration can be renewed. Treasury can also revoke, suspend or refuse to renew a registration under certain conditions and after due process. Finders violating the law will be subject to fines of up to $1,000 for a first offense and up to $5,000 for a subsequent offense. (More detail about the new sections of the law can be viewed here.)

Under the unclaimed property law, which was first enacted in 1929, Treasury each year receives millions of dollars in unclaimed property in the form of abandoned bank accounts, forgotten stocks, unclaimed insurance benefits, uncashed checks, contents of safe deposit boxes, and other sources of money or tangible items. 

Since January 2009, the McCord Treasury has received $1.3 billion in property and returned more than $572 million to rightful owners.

For more information, visit www.patreasury.gov.

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
SYS-CON Events announced today that Pythian, a global IT services company specializing in helping companies adopt disruptive technologies to optimize revenue-generating systems, has been named “Bronze Sponsor” of SYS-CON's 18th Cloud Expo, which will take place on June 7-9, 2015 at the Javits Center in New York, New York. Founded in 1997, Pythian is a global IT services company that helps companies compete by adopting disruptive technologies such as cloud, Big Data, advanced analytics, and DevO...
Companies can harness IoT and predictive analytics to sustain business continuity; predict and manage site performance during emergencies; minimize expensive reactive maintenance; and forecast equipment and maintenance budgets and expenditures. Providing cost-effective, uninterrupted service is challenging, particularly for organizations with geographically dispersed operations.
SYS-CON Events announced today that Avere Systems, a leading provider of enterprise storage for the hybrid cloud, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Avere delivers a more modern architectural approach to storage that doesn’t require the overprovisioning of storage capacity to achieve performance, overspending on expensive storage media for inactive data or the overbuilding of data centers ...
As someone who has been dedicated to automation and Application Release Automation (ARA) technology for almost six years now, one of the most common questions I get asked regards Platform-as-a-Service (PaaS). Specifically, people want to know whether release automation is still needed when a PaaS is in place, and why. Isn't that what a PaaS provides? A solution to the deployment and runtime challenges of an application? Why would anyone using a PaaS then need an automation engine with workflow ...
Recognizing the need to identify and validate information security professionals’ competency in securing cloud services, the two leading membership organizations focused on cloud and information security, the Cloud Security Alliance (CSA) and (ISC)^2, joined together to develop an international cloud security credential that reflects the most current and comprehensive best practices for securing and optimizing cloud computing environments.
With the Apple Watch making its way onto wrists all over the world, it’s only a matter of time before it becomes a staple in the workplace. In fact, Forrester reported that 68 percent of technology and business decision-makers characterize wearables as a top priority for 2015. Recognizing their business value early on, FinancialForce.com was the first to bring ERP to wearables, helping streamline communication across front and back office functions. In his session at @ThingsExpo, Kevin Roberts...
As enterprises work to take advantage of Big Data technologies, they frequently become distracted by product-level decisions. In most new Big Data builds this approach is completely counter-productive: it presupposes tools that may not be a fit for development teams, forces IT to take on the burden of evaluating and maintaining unfamiliar technology, and represents a major up-front expense. In his session at @BigDataExpo at @ThingsExpo, Andrew Warfield, CTO and Co-Founder of Coho Data, will dis...
SYS-CON Events announced today that iDevices®, the preeminent brand in the connected home industry, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. iDevices, the preeminent brand in the connected home industry, has a growing line of HomeKit-enabled products available at the largest retailers worldwide. Through the “Designed with iDevices” co-development program and its custom-built IoT Cloud Infrastruc...
Sensors and effectors of IoT are solving problems in new ways, but small businesses have been slow to join the quantified world. They’ll need information from IoT using applications as varied as the businesses themselves. In his session at @ThingsExpo, Roger Meike, Distinguished Engineer, Director of Technology Innovation at Intuit, showed how IoT manufacturers can use open standards, public APIs and custom apps to enable the Quantified Small Business. He used a Raspberry Pi to connect sensors...
Eighty percent of a data scientist’s time is spent gathering and cleaning up data, and 80% of all data is unstructured and almost never analyzed. Cognitive computing, in combination with Big Data, is changing the equation by creating data reservoirs and using natural language processing to enable analysis of unstructured data sources. This is impacting every aspect of the analytics profession from how data is mined (and by whom) to how it is delivered. This is not some futuristic vision: it's ha...
Silver Spring Networks, Inc. (NYSE: SSNI) extended its Internet of Things technology platform with performance enhancements to Gen5 – its fifth generation critical infrastructure networking platform. Already delivering nearly 23 million devices on five continents as one of the leading networking providers in the market, Silver Spring announced it is doubling the maximum speed of its Gen5 network to up to 2.4 Mbps, increasing computational performance by 10x, supporting simultaneous mesh communic...
Advances in technology and ubiquitous connectivity have made the utilization of a dispersed workforce more common. Whether that remote team is located across the street or country, management styles/ approaches will have to be adjusted to accommodate this new dynamic. In his session at 17th Cloud Expo, Sagi Brody, Chief Technology Officer at Webair Internet Development Inc., focused on the challenges of managing remote teams, providing real-world examples that demonstrate what works and what do...
CIOs and those charged with running IT Operations are challenged to deliver secure, audited, and reliable compute environments for the applications and data for the business. Behind the scenes these tasks are often accomplished by following onerous time-consuming processes and often the management of these environments and processes will be outsourced to multiple IT service providers. In addition, the division of work is often siloed into traditional "towers" that are not well integrated for cro...
The principles behind DevOps are not new - for decades people have been automating system administration and decreasing the time to deploy apps and perform other management tasks. However, only recently did we see the tools and the will necessary to share the benefits and power of automation with a wider circle of people. In his session at DevOps Summit, Bernard Sanders, Chief Technology Officer at CloudBolt Software, explored the latest tools including Puppet, Chef, Docker, and CMPs needed to...
Let’s face it, embracing new storage technologies, capabilities and upgrading to new hardware often adds complexity and increases costs. In his session at 18th Cloud Expo, Seth Oxenhorn, Vice President of Business Development & Alliances at FalconStor, will discuss how a truly heterogeneous software-defined storage approach can add value to legacy platforms and heterogeneous environments. The result reduces complexity, significantly lowers cost, and provides IT organizations with improved effi...